web analytics
  • News and Threat Analysis

    SON OF STUXNET HAS BEEN BORN AS STAXNET

    Who can forgot the Stuxnet. This is the cyberattack which actually got the inspiration for new generation of cybercriminals. This cyberattack was first discovered in 2010 by Sergey Ulasen. This virus was one of the targeted virus which takes almost 5 years to get developed. The Stuxnet is a virus whose history has been associated with one of the known cyberattack in Iranian in the nuclear program of Iran which is an another theory to be said that it is developed jointly by United States and Israel. It is a virus that directly targets programmable logic controllers (PLCs), which allow the automation of electromechanical processes such as those used to…

  • Tools, Tricks and More

    BYPASS OTP AND SMASH THIS LAYER OF SECURITY

    It is easy to say that the best way to enhance your security is by adding an another layer of security to your resources but have you thought if that another layer got bypassed? Today many applications and banks worldwide deploy OTP(One Time Password) as one of the security layer to make it more harder for attackers to take the control of another user’s account. The OTP has another significance that it allows you to verify the identity of the user. The concept of OTP is simple. It is one time password that can be either alphanumeric or PIN numbers that is delivered to the verified user to authenticate it.…

  • News and Threat Analysis

    DARK CREW FRIENDS ARE ATTACKING THE SITES USING CMS. HOW IS YOUR SITE DEVELOPED?

    In this worldwide lockdown, many people have launched their own website to entertain people. Many of them tried a Content Management System like WordPress to create their site. The simple reason behind this is that CMS(Content Management System) automates task, saves time and money as well. But what about security and privacy of our website? Many users think that setting up a web application firewall can prevent their site from all the attacks, but Beware! Hackers are smarter than us . They don’t waste their time where we have already taken precautions instead they attack on that vulnerability which we are unaware about. Some researchers from Checkpoint have explored the…

  • Tools, Tricks and More

    INTRODUCTION TO HACKING

    Many beginners get fascinated by the word HACKING ,but do we know what is behind this “Mysterious” word? The first image formed on thinking about this “Mysterious” word is of “A man with a black hood, typing commands with an evil smile.” Have you ever wondered why this “Mysterious” word is interpreted like this? The simple reason behind this is that Movies have picturized this “Mysterious” word in this manner. Beginners believe HACKERS are MAGICIANS . But this is not the reality. HACKING is a field just like any other field. Like a company needs Cost Accountants, Lawyers, Software Engineers etc.,in the same way it needs security researchers or in…